Pub Date : 2024-02-06DOI: 10.1080/02684527.2024.2304934
John Wilcox, D. Mandel
{"title":"Critical review of the analysis of competing hypotheses technique: lessons for the intelligence community","authors":"John Wilcox, D. Mandel","doi":"10.1080/02684527.2024.2304934","DOIUrl":"https://doi.org/10.1080/02684527.2024.2304934","url":null,"abstract":"","PeriodicalId":502502,"journal":{"name":"Intelligence and National Security","volume":"32 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139861742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-31DOI: 10.1080/02684527.2024.2304933
Craig Jarvis, Keith M. Martin
{"title":"A milestone in encryption control – what sank the US key-escrow policy?","authors":"Craig Jarvis, Keith M. Martin","doi":"10.1080/02684527.2024.2304933","DOIUrl":"https://doi.org/10.1080/02684527.2024.2304933","url":null,"abstract":"","PeriodicalId":502502,"journal":{"name":"Intelligence and National Security","volume":"484 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140480109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-18DOI: 10.1080/02684527.2023.2300932
Simin Kargar, Thomas Rid
{"title":"Attributing Digital Covert Action: the curious case of WikiSaudileaks","authors":"Simin Kargar, Thomas Rid","doi":"10.1080/02684527.2023.2300932","DOIUrl":"https://doi.org/10.1080/02684527.2023.2300932","url":null,"abstract":"","PeriodicalId":502502,"journal":{"name":"Intelligence and National Security","volume":"110 40","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-09DOI: 10.1080/02684527.2023.2291871
Simon Willmetts
{"title":"Forbidden history: CIA censorship,\u0000 the Invisible Government\u0000 , and the origins of the “deep state” conspiracy theory","authors":"Simon Willmetts","doi":"10.1080/02684527.2023.2291871","DOIUrl":"https://doi.org/10.1080/02684527.2023.2291871","url":null,"abstract":"","PeriodicalId":502502,"journal":{"name":"Intelligence and National Security","volume":"33 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139443958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}